github.com/rahart/packer@v0.12.2-0.20161229105310-282bb6ad370f/website/source/docs/builders/amazon-instance.html.md (about)

     1  ---
     2  description: |
     3      The `amazon-instance` Packer builder is able to create Amazon AMIs backed by
     4      instance storage as the root device. For more information on the difference
     5      between instance storage and EBS-backed instances, see the storage for the root
     6      device section in the EC2 documentation.
     7  layout: docs
     8  page_title: 'Amazon AMI Builder (instance-store)'
     9  ...
    10  
    11  # AMI Builder (instance-store)
    12  
    13  Type: `amazon-instance`
    14  
    15  The `amazon-instance` Packer builder is able to create Amazon AMIs backed by
    16  instance storage as the root device. For more information on the difference
    17  between instance storage and EBS-backed instances, see the ["storage for the
    18  root device" section in the EC2
    19  documentation](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ComponentsAMIs.html#storage-for-the-root-device).
    20  
    21  This builder builds an AMI by launching an EC2 instance from an existing
    22  instance-storage backed AMI, provisioning that running machine, and then
    23  bundling and creating a new AMI from that machine. This is all done in your own
    24  AWS account. The builder will create temporary key pairs, security group rules,
    25  etc. that provide it temporary access to the instance while the image is being
    26  created. This simplifies configuration quite a bit.
    27  
    28  The builder does *not* manage AMIs. Once it creates an AMI and stores it in
    29  your account, it is up to you to use, delete, etc. the AMI.
    30  
    31  -> **Note:** This builder requires that the [Amazon EC2 AMI
    32  Tools](https://aws.amazon.com/developertools/368) are installed onto the
    33  machine. This can be done within a provisioner, but must be done before the
    34  builder finishes running.
    35  
    36  ~> Instance builds are not supported for Windows. Use [`amazon-ebs`](amazon-ebs.html) instead.
    37  
    38  ## Configuration Reference
    39  
    40  There are many configuration options available for the builder. They are
    41  segmented below into two categories: required and optional parameters. Within
    42  each category, the available configuration keys are alphabetized.
    43  
    44  In addition to the options listed here, a
    45  [communicator](/docs/templates/communicator.html) can be configured for this
    46  builder.
    47  
    48  ### Required:
    49  
    50  -   `access_key` (string) - The access key used to communicate with AWS. [Learn
    51      how to set this.](/docs/builders/amazon.html#specifying-amazon-credentials)
    52  
    53  -   `account_id` (string) - Your AWS account ID. This is required for bundling
    54      the AMI. This is *not the same* as the access key. You can find your account
    55      ID in the security credentials page of your AWS account.
    56  
    57  -   `ami_name` (string) - The name of the resulting AMI that will appear when
    58      managing AMIs in the AWS console or via APIs. This must be unique. To help
    59      make this unique, use a function like `timestamp` (see [configuration
    60      templates](/docs/templates/configuration-templates.html) for more info)
    61  
    62  -   `instance_type` (string) - The EC2 instance type to use while building the
    63      AMI, such as `m1.small`.
    64  
    65  -   `region` (string) - The name of the region, such as `us-east-1`, in which to
    66      launch the EC2 instance to create the AMI.
    67  
    68  -   `s3_bucket` (string) - The name of the S3 bucket to upload the AMI. This
    69      bucket will be created if it doesn't exist.
    70  
    71  -   `secret_key` (string) - The secret key used to communicate with AWS. [Learn
    72      how to set this.](/docs/builders/amazon.html#specifying-amazon-credentials)
    73  
    74  -   `source_ami` (string) - The initial AMI used as a base for the newly
    75      created machine.
    76  
    77  -   `x509_cert_path` (string) - The local path to a valid X509 certificate for
    78      your AWS account. This is used for bundling the AMI. This X509 certificate
    79      must be registered with your account from the security credentials page in
    80      the AWS console.
    81  
    82  -   `x509_key_path` (string) - The local path to the private key for the X509
    83      certificate specified by `x509_cert_path`. This is used for bundling
    84      the AMI.
    85  
    86  ### Optional:
    87  
    88  -   `ami_block_device_mappings` (array of block device mappings) - Add the block
    89      device mappings to the AMI. The block device mappings allow for keys:
    90  
    91      -   `delete_on_termination` (boolean) - Indicates whether the EBS volume is
    92          deleted on instance termination. Default `false`. **NOTE**: If this
    93          value is not explicitly set to `true` and volumes are not cleaned up by
    94          an alternative method, additional volumes will accumulate after
    95          every build.
    96  
    97      -   `device_name` (string) - The device name exposed to the instance (for
    98           example, `/dev/sdh` or `xvdh`). Required when specifying `volume_size`.
    99  
   100      -   `encrypted` (boolean) - Indicates whether to encrypt the volume or not
   101  
   102      -   `iops` (integer) - The number of I/O operations per second (IOPS) that the
   103          volume supports. See the documentation on
   104          [IOPs](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_EbsBlockDevice.html)
   105          for more information
   106  
   107      -   `no_device` (boolean) - Suppresses the specified device included in the
   108          block device mapping of the AMI
   109  
   110      -   `snapshot_id` (string) - The ID of the snapshot
   111  
   112      -   `virtual_name` (string) - The virtual device name. See the documentation on
   113          [Block Device
   114          Mapping](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_BlockDeviceMapping.html)
   115          for more information
   116  
   117      -   `volume_size` (integer) - The size of the volume, in GiB. Required if not
   118          specifying a `snapshot_id`
   119  
   120      -   `volume_type` (string) - The volume type. `gp2` for General Purpose (SSD)
   121          volumes, `io1` for Provisioned IOPS (SSD) volumes, and `standard` for Magnetic
   122          volumes
   123  
   124  -   `ami_description` (string) - The description to set for the
   125      resulting AMI(s). By default this description is empty.
   126  
   127  -   `ami_groups` (array of strings) - A list of groups that have access to
   128      launch the resulting AMI(s). By default no groups have permission to launch
   129      the AMI. `all` will make the AMI publicly accessible. AWS currently doesn't
   130      accept any value other than `all`.
   131  
   132  -   `ami_product_codes` (array of strings) - A list of product codes to
   133      associate with the AMI. By default no product codes are associated with
   134      the AMI.
   135  
   136  -   `ami_regions` (array of strings) - A list of regions to copy the AMI to.
   137      Tags and attributes are copied along with the AMI. AMI copying takes time
   138      depending on the size of the AMI, but will generally take many minutes.
   139  
   140  -   `ami_users` (array of strings) - A list of account IDs that have access to
   141      launch the resulting AMI(s). By default no additional users other than the
   142      user creating the AMI has permissions to launch it.
   143  
   144  -   `ami_virtualization_type` (string) - The type of virtualization for the AMI
   145      you are building. This option is required to register HVM images. Can be
   146      `paravirtual` (default) or `hvm`.
   147  
   148  -   `associate_public_ip_address` (boolean) - If using a non-default VPC, public
   149      IP addresses are not provided by default. If this is toggled, your new
   150      instance will get a Public IP.
   151  
   152  -   `availability_zone` (string) - Destination availability zone to launch
   153      instance in. Leave this empty to allow Amazon to auto-assign.
   154  
   155  -   `bundle_destination` (string) - The directory on the running instance where
   156      the bundled AMI will be saved prior to uploading. By default this is `/tmp`.
   157      This directory must exist and be writable.
   158  
   159  -   `bundle_prefix` (string) - The prefix for files created from bundling the
   160      root volume. By default this is `image-{{timestamp}}`. The `timestamp`
   161      variable should be used to make sure this is unique, otherwise it can
   162      collide with other created AMIs by Packer in your account.
   163  
   164  -   `bundle_upload_command` (string) - The command to use to upload the
   165      bundled volume. See the "custom bundle commands" section below for
   166      more information.
   167  
   168  -   `bundle_vol_command` (string) - The command to use to bundle the volume. See
   169      the "custom bundle commands" section below for more information.
   170  
   171  -   `ebs_optimized` (boolean) - Mark instance as [EBS
   172      Optimized](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSOptimized.html).
   173      Default `false`.
   174  
   175  -   `enhanced_networking` (boolean) - Enable enhanced
   176      networking (SriovNetSupport) on HVM-compatible AMIs. If true, add
   177      `ec2:ModifyInstanceAttribute` to your AWS IAM policy.
   178  
   179  -   `force_deregister` (boolean) - Force Packer to first deregister an existing
   180      AMI if one with the same name already exists. Defaults to `false`.
   181  
   182  -   `force_delete_snapshot` (boolean) - Force Packer to delete snapshots associated with
   183      AMIs, which have been deregistered by `force_deregister`. Defaults to `false`.
   184  
   185  -   `iam_instance_profile` (string) - The name of an [IAM instance
   186      profile](https://docs.aws.amazon.com/IAM/latest/UserGuide/instance-profiles.html)
   187      to launch the EC2 instance with.
   188  
   189  -   `launch_block_device_mappings` (array of block device mappings) - Add the
   190      block device mappings to the launch instance. The block device mappings are
   191      the same as `ami_block_device_mappings` above.
   192  
   193  -   `run_tags` (object of key/value strings) - Tags to apply to the instance
   194      that is *launched* to create the AMI. These tags are *not* applied to the
   195      resulting AMI unless they're duplicated in `tags`.
   196  
   197  -   `security_group_id` (string) - The ID (*not* the name) of the security group
   198      to assign to the instance. By default this is not set and Packer will
   199      automatically create a new temporary security group to allow SSH access.
   200      Note that if this is specified, you must be sure the security group allows
   201      access to the `ssh_port` given below.
   202  
   203  -   `security_group_ids` (array of strings) - A list of security groups as
   204      described above. Note that if this is specified, you must omit the
   205      `security_group_id`.
   206  
   207  -   `skip_region_validation` (boolean) - Set to true if you want to skip
   208      validation of the region configuration option.  Defaults to `false`.
   209  
   210  -   `snapshot_groups` (array of strings) - A list of groups that have access to
   211      create volumes from the snapshot(s). By default no groups have permission to create
   212      volumes form the snapshot(s). `all` will make the snapshot publicly accessible.
   213  
   214  -   `snapshot_users` (array of strings) - A list of account IDs that have access to
   215      create volumes from the snapshot(s). By default no additional users other than the
   216      user creating the AMI has permissions to create volumes from the backing snapshot(s).
   217  
   218  -   `source_ami_filter` (object) - Filters used to populate the `source_ami` field.
   219      Example:
   220  
   221      ``` {.javascript}
   222      "source_ami_filter": {
   223          "filters": {
   224            "virtualization-type": "hvm",
   225            "name": "*ubuntu-xenial-16.04-amd64-server-*",
   226            "root-device-type": "ebs"
   227          },
   228          "owners": ["099720109477"],
   229          "most_recent": true
   230      }
   231      ```
   232  
   233      This selects the most recent Ubuntu 16.04 HVM EBS AMI from Canonical.
   234      NOTE: This will fail unless *exactly* one AMI is returned. In the above
   235      example, `most_recent` will cause this to succeed by selecting the newest image.
   236  
   237      -   `filters` (map of strings) - filters used to select a `source_ami`.
   238           NOTE: This will fail unless *exactly* one AMI is returned.
   239           Any filter described in the docs for [DescribeImages](http://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeImages.html)
   240           is valid.
   241  
   242      -   `owners` (array of strings) - This scopes the AMIs to certain Amazon account IDs.
   243           This is helpful to limit the AMIs to a trusted third party, or to your own account.
   244  
   245      -   `most_recent` (bool) - Selects the newest created image when true.
   246           This is most useful for selecting a daily distro build.
   247  
   248  -   `snapshot_tags` (object of key/value strings) - Tags to apply to snapshot.
   249       They will override AMI tags if already applied to snapshot.
   250  
   251  -   `spot_price` (string) - The maximum hourly price to launch a spot instance
   252      to create the AMI. It is a type of instances that EC2 starts when the
   253      maximum price that you specify exceeds the current spot price. Spot price
   254      will be updated based on available spot instance capacity and current spot
   255      Instance requests. It may save you some costs. You can set this to `auto`
   256      for Packer to automatically discover the best spot price or to `0` to use
   257      an on-demand instance (default).
   258  
   259  -   `spot_price_auto_product` (string) - Required if `spot_price` is set
   260      to `auto`. This tells Packer what sort of AMI you're launching to find the
   261      best spot price. This must be one of: `Linux/UNIX`, `SUSE Linux`, `Windows`,
   262      `Linux/UNIX (Amazon VPC)`, `SUSE Linux (Amazon VPC)`, `Windows (Amazon VPC)`
   263  
   264  -   `ssh_keypair_name` (string) - If specified, this is the key that will be
   265      used for SSH with the machine. The key must match a key pair name loaded
   266      up into Amazon EC2.  By default, this is blank, and Packer will
   267      generate a temporary key pair unless
   268      [`ssh_password`](/docs/templates/communicator.html#ssh_password) is used.
   269      [`ssh_private_key_file`](/docs/templates/communicator.html#ssh_private_key_file)
   270      or `ssh_agent_auth` must be specified when `ssh_keypair_name` is utilized.
   271  
   272  -   `ssh_agent_auth` (boolean) - If true, the local SSH agent will be used to
   273      authenticate connections to the source instance. No temporary key pair will
   274      be created, and the values of `ssh_password` and `ssh_private_key_file` will
   275      be ignored. To use this option with a key pair already configured in the source
   276      AMI, leave the `ssh_keypair_name` blank. To associate an existing key pair
   277      in AWS with the source instance, set the `ssh_keypair_name` field to the name
   278      of the key pair.
   279  
   280  -   `ssh_private_ip` (boolean) - If true, then SSH will always use the private
   281      IP if available.
   282  
   283  -   `subnet_id` (string) - If using VPC, the ID of the subnet, such as
   284      `subnet-12345def`, where Packer will launch the EC2 instance. This field is
   285      required if you are using an non-default VPC.
   286  
   287  -   `tags` (object of key/value strings) - Tags applied to the AMI.
   288  
   289  -   `temporary_key_pair_name` (string) - The name of the temporary key pair
   290      to generate. By default, Packer generates a name with an UUID.
   291  
   292  -   `user_data` (string) - User data to apply when launching the instance. Note
   293      that you need to be careful about escaping characters due to the templates
   294      being JSON. It is often more convenient to use `user_data_file`, instead.
   295  
   296  -   `user_data_file` (string) - Path to a file that will be used for the user
   297      data when launching the instance.
   298  
   299  -   `vpc_id` (string) - If launching into a VPC subnet, Packer needs the VPC ID
   300      in order to create a temporary security group within the VPC.
   301  
   302  -   `x509_upload_path` (string) - The path on the remote machine where the X509
   303      certificate will be uploaded. This path must already exist and be writable.
   304      X509 certificates are uploaded after provisioning is run, so it is perfectly
   305      okay to create this directory as part of the provisioning process. Defaults to
   306      `/tmp`.
   307  
   308  -   `windows_password_timeout` (string) - The timeout for waiting for a Windows
   309      password for Windows instances. Defaults to 20 minutes. Example value: `10m`
   310  
   311  ## Basic Example
   312  
   313  Here is a basic example. It is completely valid except for the access keys:
   314  
   315  ``` {.javascript}
   316  {
   317    "type": "amazon-instance",
   318    "access_key": "YOUR KEY HERE",
   319    "secret_key": "YOUR SECRET KEY HERE",
   320    "region": "us-east-1",
   321    "source_ami": "ami-d9d6a6b0",
   322    "instance_type": "m1.small",
   323    "ssh_username": "ubuntu",
   324  
   325    "account_id": "0123-4567-0890",
   326    "s3_bucket": "packer-images",
   327    "x509_cert_path": "x509.cert",
   328    "x509_key_path": "x509.key",
   329    "x509_upload_path": "/tmp",
   330  
   331    "ami_name": "packer-quick-start {{timestamp}}"
   332  }
   333  ```
   334  
   335  -> **Note:** Packer can also read the access key and secret access key from
   336  environmental variables. See the configuration reference in the section above
   337  for more information on what environmental variables Packer will look for.
   338  
   339  ## Accessing the Instance to Debug
   340  
   341  If you need to access the instance to debug for some reason, run the builder
   342  with the `-debug` flag. In debug mode, the Amazon builder will save the private
   343  key in the current directory and will output the DNS or IP information as well.
   344  You can use this information to access the instance as it is running.
   345  
   346  ## Custom Bundle Commands
   347  
   348  A lot of the process required for creating an instance-store backed AMI involves
   349  commands being run on the actual source instance. Specifically, the
   350  `ec2-bundle-vol` and `ec2-upload-bundle` commands must be used to bundle the
   351  root filesystem and upload it, respectively.
   352  
   353  Each of these commands have a lot of available flags. Instead of exposing each
   354  possible flag as a template configuration option, the instance-store AMI builder
   355  for Packer lets you customize the entire command used to bundle and upload the
   356  AMI.
   357  
   358  These are configured with `bundle_vol_command` and `bundle_upload_command`. Both
   359  of these configurations are [configuration
   360  templates](/docs/templates/configuration-templates.html) and have support for
   361  their own set of template variables.
   362  
   363  ### Bundle Volume Command
   364  
   365  The default value for `bundle_vol_command` is shown below. It is split across
   366  multiple lines for convenience of reading. The bundle volume command is
   367  responsible for executing `ec2-bundle-vol` in order to store and image of the
   368  root filesystem to use to create the AMI.
   369  
   370  ``` {.text}
   371  sudo -i -n ec2-bundle-vol \
   372    -k {{.KeyPath}}  \
   373    -u {{.AccountId}} \
   374    -c {{.CertPath}} \
   375    -r {{.Architecture}} \
   376    -e {{.PrivatePath}}/* \
   377    -d {{.Destination}} \
   378    -p {{.Prefix}} \
   379    --batch \
   380    --no-filter
   381  ```
   382  
   383  The available template variables should be self-explanatory based on the
   384  parameters they're used to satisfy the `ec2-bundle-vol` command.
   385  
   386  \~> **Warning!** Some versions of ec2-bundle-vol silently ignore all .pem and
   387  .gpg files during the bundling of the AMI, which can cause problems on some
   388  systems, such as Ubuntu. You may want to customize the bundle volume command to
   389  include those files (see the `--no-filter` option of `ec2-bundle-vol`).
   390  
   391  ### Bundle Upload Command
   392  
   393  The default value for `bundle_upload_command` is shown below. It is split across
   394  multiple lines for convenience of reading. Access key and secret key are omitted
   395  if using instance profile. The bundle upload command is responsible for taking
   396  the bundled volume and uploading it to S3.
   397  
   398  ``` {.text}
   399  sudo -i -n ec2-upload-bundle \
   400    -b {{.BucketName}} \
   401    -m {{.ManifestPath}} \
   402    -a {{.AccessKey}} \
   403    -s {{.SecretKey}} \
   404    -d {{.BundleDirectory}} \
   405    --batch \
   406    --region {{.Region}} \
   407    --retry
   408  ```
   409  
   410  The available template variables should be self-explanatory based on the
   411  parameters they're used to satisfy the `ec2-upload-bundle` command.